search
HomeTechnology peripheralsAIStrengthen AI security capabilities to realize the maximum value release of AI applications

At the NSFOCUS Technology Smart Security Conference held recently, Wu Jiangxing, an academician of the Chinese Academy of Engineering, emphasized that the in-depth application of AI has high requirements on data, algorithms, and computing power, and also poses a huge challenge to security and privacy capabilities. He pointed out that only by ensuring data security and privacy protection while improving AI capabilities and security can the application value of AI technology be truly released

Academician Tan Jianrong said at the meeting that generative artificial intelligence, metaverse digital space and anthropomorphic robots are three disruptive technologies. The cross-integration of these technologies will create a new situation in the theoretical methods and applications of information technology. However, the application of generative artificial intelligence also involves risks in terms of data compliance and data quality. These risks not only come from the application level, but also from the development level, so early warning and prevention are required

How to prevent the risks of generative artificial intelligence? When there are many unknown vulnerabilities in the field of network security, how should we effectively prevent them?

Strengthen AI security capabilities to realize the maximum value release of AI applications

Data security is related to collaborative protection at multiple levels

Guo Qiang, deputy director of the National Information Center, said that the fight for "data sovereignty" has become a new trend in the development of global data security. Countries have introduced data strategies and legislated to safeguard national data sovereignty.

"The "Opinions on Building a Data Basic System to Better Play the Role of Data Elements" puts forward the requirement of 'available and invisible' for raw data. Based on this, our team sorts out and manages data as assets and classifies the data. Classification, and further improve the accuracy and efficiency of discovering sensitive data in asset ledgers." Ye Xiaohu, chief technology officer of NSFOCUS Technology Group, said that managing data in the form of assets requires technological innovation, and then through engineering to achieve mature industry applications.

Under the guidance of relevant national methods and policies, data system construction entities at all levels have explored collaborative innovation.

Guoqiang introduced that the national-level "Digital Shield" system aims to ensure data security. Based on the security platform, it integrates existing network and data security capabilities and establishes a system that runs through the network layer, computing layer (cloud platform), Collaborative data security protection system of application layer and data layer

Ye Xiaohu said that NSFOCUS's "Wind Cloud Guard" security model is built based on massive security professional knowledge training. The system covers a variety of scenarios such as security operations, detection and response, attack and defense confrontation, knowledge question and answer, etc., and can assist decision-making in network security operations. The construction of the system is carried out from the three dimensions of "scenario traction, technology drive, and ecological collaboration". Through large models, it solves problems in actual combat situation command and dispatch, red and blue confrontation auxiliary decision-making, and safety operation efficiency improvement

Through innovative data security technology, safe and effective applications can be achieved

"The development of the digital economy cannot be separated from digital security. To accelerate the sustainable development of the digital economy, we must maintain data security and network security, and build a good security base." Wu Jiangxing pointed out that the current research and development of core digital technologies should be further accelerated. and development, build a new situation of data security and network security, and safeguard the development of the digital economy.

Ensuring data security is for effective application, and innovative technologies should promote their effective circulation and realize value on the basis of security. Guoqiang said that the National Information Center will continue to promote the pilot verification of the construction of the "Digital Shield" system to securely empower computing infrastructure such as "Eastern Digital and Western Computing" and build a national computing network security ecosystem.

“The focus of data security technology innovation should be on technical support to solve how to safely transfer data sharing and exchange.” Ye Xiaohu said that in order to ensure the confidentiality and integrity of data and applications in the storage state, running state, and transmission state It achieves data "availability and invisibility" with higher performance. NSFOCUS's data safe achieves reliable data protection, task trustworthy computing and data controllability through trusted computing environment, fully confidential data processing, dynamic permission control and other technologies. Functions such as circulation help data sharing be implemented legally, compliantly, safely and efficiently.

Strengthen AI security capabilities to realize the maximum value release of AI applications

The Computer Federation of China and NSFOCUS jointly announced the 2023 "Kunpeng" scientific research fund project at the meeting. According to reports, this year's "Kunpeng" scientific research fund will focus on three directions: data security and privacy computing, artificial intelligence empowerment and confrontation, and new network security attack and defense technologies. It aims to promote the effective transformation and implementation of national scientific research results, and through industrial The cooperation between academia and research will maximize the potential of the security industry and promote the overall domestic security market to adapt to the widespread application of artificial intelligence

The content that needs to be rewritten is: (picture provided by the conference organizer)

(Source: Science and Technology Daily)

The above is the detailed content of Strengthen AI security capabilities to realize the maximum value release of AI applications. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:搜狐. If there is any infringement, please contact admin@php.cn delete
Are You At Risk Of AI Agency Decay? Take The Test To Find OutAre You At Risk Of AI Agency Decay? Take The Test To Find OutApr 21, 2025 am 11:31 AM

This article explores the growing concern of "AI agency decay"—the gradual decline in our ability to think and decide independently. This is especially crucial for business leaders navigating the increasingly automated world while retainin

How to Build an AI Agent from Scratch? - Analytics VidhyaHow to Build an AI Agent from Scratch? - Analytics VidhyaApr 21, 2025 am 11:30 AM

Ever wondered how AI agents like Siri and Alexa work? These intelligent systems are becoming more important in our daily lives. This article introduces the ReAct pattern, a method that enhances AI agents by combining reasoning an

Revisiting The Humanities In The Age Of AIRevisiting The Humanities In The Age Of AIApr 21, 2025 am 11:28 AM

"I think AI tools are changing the learning opportunities for college students. We believe in developing students in core courses, but more and more people also want to get a perspective of computational and statistical thinking," said University of Chicago President Paul Alivisatos in an interview with Deloitte Nitin Mittal at the Davos Forum in January. He believes that people will have to become creators and co-creators of AI, which means that learning and other aspects need to adapt to some major changes. Digital intelligence and critical thinking Professor Alexa Joubin of George Washington University described artificial intelligence as a “heuristic tool” in the humanities and explores how it changes

Understanding LangChain Agent FrameworkUnderstanding LangChain Agent FrameworkApr 21, 2025 am 11:25 AM

LangChain is a powerful toolkit for building sophisticated AI applications. Its agent architecture is particularly noteworthy, allowing developers to create intelligent systems capable of independent reasoning, decision-making, and action. This expl

What are the Radial Basis Functions Neural Networks?What are the Radial Basis Functions Neural Networks?Apr 21, 2025 am 11:13 AM

Radial Basis Function Neural Networks (RBFNNs): A Comprehensive Guide Radial Basis Function Neural Networks (RBFNNs) are a powerful type of neural network architecture that leverages radial basis functions for activation. Their unique structure make

The Meshing Of Minds And Machines Has ArrivedThe Meshing Of Minds And Machines Has ArrivedApr 21, 2025 am 11:11 AM

Brain-computer interfaces (BCIs) directly link the brain to external devices, translating brain impulses into actions without physical movement. This technology utilizes implanted sensors to capture brain signals, converting them into digital comman

Insights on spaCy, Prodigy and Generative AI from Ines MontaniInsights on spaCy, Prodigy and Generative AI from Ines MontaniApr 21, 2025 am 11:01 AM

This "Leading with Data" episode features Ines Montani, co-founder and CEO of Explosion AI, and co-developer of spaCy and Prodigy. Ines offers expert insights into the evolution of these tools, Explosion's unique business model, and the tr

A Guide to Building Agentic RAG Systems with LangGraphA Guide to Building Agentic RAG Systems with LangGraphApr 21, 2025 am 11:00 AM

This article explores Retrieval Augmented Generation (RAG) systems and how AI agents can enhance their capabilities. Traditional RAG systems, while useful for leveraging custom enterprise data, suffer from limitations such as a lack of real-time dat

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software